Reliable data transfer over a perfectly reliable channel r, Computer Networking

Assignment Help:

Reliable  data transfer  over a perfectly reliable channel rdt 1.0

First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protocols  itself  which in  trivia. The finite state  machine  definition for  the rdt 1.0 sender  and receiver are shown  in the FSM  in  defines the  operation of the sender while  the s FSM  defines the operation  of the  defines receiver. It is important  to note  that  there are separate FSM  for the  sender  and  of the receiver. The sender an deceiver FSM in figure  each have just  one  state. The  arrows  in the FSM  description indicate the transition of the protocols from one  state to another. The event causing the transition is shown above  the horizontal line  labelling the transition and the  actions  taken  when the  event occurs are shown below  the horizontal  lien when  no action  is taken  on an event  or no event  occurs   and an  action is  taken we  use the symbol a below or above the horizontal respectively  to explicitly denote the lack  of an action or event. The  initial  state of the FSM  is indicated by the  dashed arrow.

 

409_rdt a protocol for a completely  reliable  channel.png

 


                               Figure  rdt a protocol for a completely  reliable  channel

The sending  side of rdt  simply  accepts  data from  the upper  layer via the rdt send  event,  creates a packet  containing the data   and sends  the packet into the channel. The rdt send event would  result form  procedure call  by the upper layer  application.

On the receiving  side  rdt receives  a packet  from the  underlying channel via the rdt _rev event removes tha data from the  packet and passes the data  up to the upper layer. The  rdt_ rcv event would  result  from a procedure call  event from the lower layer  protocols.

In  this protocols  there  is no  difference  between a unit  of  data  and  a packet. Also  all packet  flow is  from  the sender  to receiver with a  perfectly  reliable  channel  there  is no  need for the  receiver  side to provide  any feedback to the sender.

 


Related Discussions:- Reliable data transfer over a perfectly reliable channel r

Cipher password guess-cryptography, a. If a password to a cipher is exactly...

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

Explain bus topology, Explain Bus Topology. The physical Bus topology i...

Explain Bus Topology. The physical Bus topology is the easiest and most widely used of the network designs. It having of one continuous length of cable (trunk) and a terminatin

What do you mean by addressing, Q. What do you mean by Addressing? Add...

Q. What do you mean by Addressing? Addressing Require to uniquely and universally identify every device to allow global communication Internet address or IP address is us

Packet switching and virtual circuit packet switching, Describe Circuit swi...

Describe Circuit switching, Packet switching and Virtual Circuit Packet switching. Explain their suitability for different applications such as telephone and internet. Packet S

Ftp and ftp application layer protocols, What is the difference between TFT...

What is the difference between TFTP and FTP application layer protocols? Ans) TFTP - Trivial File Transfer Protocol A stripped down version of FTP, easy to use and fast. TFTP

What is the disadvantage of a star topology, What is the disadvantage of a ...

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

Routing table - network layer and routing , Routing Table A routing  t...

Routing Table A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  desti

Define the tasks for which sns is used, Define the tasks for which SNS is u...

Define the tasks for which SNS is used SNA can be used for the following types of tasks: -  Terminal access to mainframe and midrange computer applications. -  File trans

Program to reload the router -ccna, Cable, Erase, and Reload the Router ...

Cable, Erase, and Reload the Router Step 1: Cable the network. Cable a network that is same to the one in the topology diagram. Step 2: Clear the configuration on the rou

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd